File _patchinfo of Package patchinfo.11053
<patchinfo incident="11053"> <issue tracker="bnc" id="1013712">VUL-0: CVE-2016-9798: bluez,bluez-hcidump: use-after-free in conf_opt()</issue> <issue tracker="bnc" id="1015171">VUL-1: CVE-2016-9917: bluez,bluez-hcidump: Heap-based buffer overflow vulnerability in read_n()</issue> <issue tracker="bnc" id="1013893">VUL-0: CVE-2016-9802: bluez: buffer over-read in l2cap_packet()</issue> <issue tracker="bnc" id="1013708">VUL-0: CVE-2016-9797: bluez,bluez-hcidump: buffer over-read in l2cap_dump()</issue> <issue tracker="cve" id="2016-9798"/> <issue tracker="cve" id="2016-9917"/> <issue tracker="cve" id="2016-9797"/> <issue tracker="cve" id="2016-9802"/> <packager>acho</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for bluez</summary> <description>This update for bluez fixes the following issues: Security issues fixed: - CVE-2016-9797: Fixed a buffer over-read in l2cap_dump() (bsc#1013708). - CVE-2016-9798: Fixed a use-after-free in conf_opt() (bsc#1013712). - CVE-2016-9917: Fixed a heap-based buffer overflow in read_n() (bsc#1015171). </description> </patchinfo>